Use integrated identity information to create and manage identities and control access to enterprise resources. We provide identity and access management, single sign–on (SSO), access governance, and more.

Detect and respond to all potential threats quickly and decisively. By monitoring user activities, security events, and critical systems, we provide actionable security intelligence to reduce the risk of data breach.

Get affordable, high-performance disaster recovery. We protect your workloads and help you meet or exceed RPOs and RTOs of an hour or less, with mirroring-like performance at a price point approaching tape.

Manage risk and enforce compliance at the speed of business

Is your IT environment driven by mobility, consumerization, cloud, or a combination of these and other disruptive technologies? NetIQ Secure Configuration Manager™ helps you to proactively enforce security configuration policy across critical systems in evolving IT environments. Start reducing your risk of security breaches, failed audits, or costly downtime today.

Automated security and compliance features

Data protection made easy
How well is your sensitive data protected from breaches, exploits, or cyber-attacks? An automated, continuous process that monitors your systems for adherence to industry regulations and security best practices can help. Read more ›

Multiple regulatory compliance mandates? No problem.
Ensuring regulatory compliance in a heavily regulated industry can be an overwhelming task. What if you could achieve your compliance objectives using the resources you have? Now you can with NetIQ. Read more ›

Empower the business. Manage IT risk.
Business stakeholders need visibility into the security and compliance risks associated with sensitive organizational data. Our solution helps you to work proactively with the business to mitigate risks. Read more ›